| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: where does a hack process begin |
From: "Geo."
"Rich" wrote in message news:3e34b3fc{at}w3.nls.net...
>> I'm not sure your concern is as clear cut as it might be with a
corporate server. You mentioned in another thread today that you had a
problem with a collocated server for which your customer has responsibility
or shares responsibility for the server and you can suffer from your
customers mistakes. This is not a technical issue and there is no
technical solution.<<
It is a technical issue and there is a technical solution, it's called
packet shaping and it should have stopped the traffic from the customers
machine from reaching the router at a rate greater then their allowed
bandwidth. I'm still trying to figure out what it is about this worm that
allowed it to get past the packet shaper. It's obviously a misconfiguration
of some sort since the packets weren't spoofed but as yet the technical
solution evades me..
But for a moment lets assume you are correct, that as long as a user is
involved there is no technical solution. What are the implications of this
line of reasoning wrt copy protection then?
Geo.
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.